MaxAttach NAS 4100 User Guide Version 1.
Copyrights & Trademarks © 2000 Maxtor Corporation. All rights reserved. Maxtor is a registered trademark of Maxtor Corporation. MaxAttach and MaxNeighborhood are trademarks of Maxtor Corporation. Other product names, company names and logos are trademarks or registered trademarks of their respective owners. Specifications subject to change without notice.
Contents About This Guide............................................................... 1 Who Should Use This Guide ................................................ 1 Overview .............................................................................. 1 Equipment Required for Administration ............................... 1 Placement Requirements ...................................................... 2 Server Placement ........................................................... 3 Safety Requirement ....
NIC Team Configuration ............................................ 47 Breaking and Restoring Team Configuration ............... 48 3 Disks and Volumes ...................................................... 51 Configure Disk and Volume Properties ............................... 51 Disk Quotas ........................................................................ 54 Quota Management ..................................................... 55 Quota Entries .....................................................
Mac Service ................................................................. 95 Telnet Service .............................................................. 95 SNMP Service ............................................................. 95 Network Protocol Overview: SNMP..................... 95 SNMP Service Configuration................................. 97 5 Users and Groups ....................................................... 99 Manage Local Users .......................................................
Shutdown Appliance ..........................................................142 Back-up and Restore Tool .................................................143 Logs ...................................................................................145 Application Log ..........................................................145 System Log .................................................................146 Security Log ...............................................................147 Manage Logs ...........
About This Guide Who Should Use This Guide This MaxAttach™ NAS 4100 User Guide is intended to help setup, configure, and maintain MaxAttach NAS 4100. It assumes that you are somewhat familiar with networking and system administration basics. Overview Your MaxAttach comes ready to install with all the required software. It works in a 10/100 Mbps Ethernet network (or Gigabit Ethernet network when so equipped), and is administered using an Internet Explorer web browser.
Client for Microsoft Networks enabled over TCP/IP. Network Interface Card (NIC) CD-ROM Drive Placement Requirements When placing your MaxAttach NAS 4100, you will want to consider requirements for power and network availability, as well as a space with well regulated temperature and humidity that is relatively free of dust and other air-born contaminants. The following tables are designed to help you plan your MaxAttach NAS 4100 installation. Table 2-1.
WARNING: Make sure your site has the necessary capacity to handle your MaxAttach unit(s). Overloading electrical supply circuits is extremely hazardous. Care should also be taken to properly ground all rack mounted equipment. Table 2-3.
secure mounting. If your installation calls for placement on a table top, apply the enclosed rubber feet to the bottom of the chassis. Safety Requirement Replace battery with model CR2032 only. Use of another battery may present a risk of fire or explosion. A model CR2032 battery can be purchased at your local retail electronics supply source. WARNING: Battery may explode if mistreated. Do not recharge, disassemble or dispose of in fire.
Hard disk drive LED indicates read/write activity. SOFT POWER SWITCH Figure 1 LAN 1 LAN 2 HARD DISK DRIVE LEDs Back Panel Each Ethernet Port has two LEDs. One indicates link and the other activity. Note: On units with a Gigabit Ethernet option installed, additional LEDs will be present.
Typographical Conventions The following typographical conventions are used in this guide to help you locate and identify information: Italic text is used for emphasis and book titles. Bold text identifies menu names, menu options, items you can click on the screen, and keyboard keys. identifies file names, folder names, and text that either appears on the screen or that you are required to type in. Courier font Note: Notes provide extra information, tips, and hints regarding the topic.
MaxAttach End User License Agreement (EULA) Warranty Statement Also see our Web site at: http://www.maxattach.com for latest Release Notes.
8
1 Getting Started The MaxAttach Network Attached Storage (NAS) 4100 is a Microsoft® Windows® Powered server appliance that attaches directly to the computer network. The MaxAttach is optimized to perform a single function: provide storage to other computers attached to the network.
“Home Page"—Information on the default page that displays when you connect to the MaxAttach Navigation of the MaxAttach Administration UI At the top of the MaxAttach Administration UI are the status area and the primary and secondary menu bars. The body of each page of the MaxAttach Administration UI is the content area.
Menu Bars Immediately below the status area is the primary menu bar, which lists the available MaxAttach tasks by type. The secondary menu bar lists subtasks that users can perform for each task group identified in the primary menu bar. The secondary menu bar is dynamic, and the available task types change depending upon the task group selected. Figure 2 Primary and secondary menu bars Roll-over text for items in the menu bar provides even more information.
1. On the primary menu bar, click the general type of task you want to perform. 2. On the secondary menu bar or in the list of tasks, click the specific type of task you want to perform. 3. In the content area: a. If an Object Selection table is available, select the object you want to manage or configure by clicking the radio button to the left of the object name. Then select the task you want to perform from the Tasks list on the right. b.
Initial MaxAttach Configuration Follow the steps listed below to configure your MaxAttach before first use. 1. Change the MaxAttach identity (see “Identification” on page 18). 2. Change the Administrator password (see “Change Administrator Password” on page 43). 3. Set the date and time (see “Date and Time” on page 141). 4. If necessary, change the drive configuration (see “Configure Disk and Volume Properties” on page 51). 5. Reboot (see “Shutdown Appliance” on page 142). 6. Close your browser session.
1. Click the Contents tab. 2. To browse through the topics, click the book icons. To use the Index 1. Click the Index tab. 2. Scroll through the alphabetical list and click a topic. Note: You can move backwards in Help by clicking the Previous Topic link in the upper right corner of each help page. However, if no previous topic has been visited, clicking the Previous Topic link will back you out of the Help system altogether.
3. Log in. 4. Click the Start button, then select Help from the Start menu. Home Page This default page (Figure 3) displays when you connect to the MaxAttach from a client computer on the network. Figure 3 Home page From the Home page, you can choose which task to perform or which MaxAttach attribute to manage or configure.
16
2 Network Setup From the Network Setup page, you can choose which network-related properties of the MaxAttach to configure: Identification—Set the name and domain membership of the MaxAttach. (See “Identification” on page 18.) Interfaces—Configure the local network settings on the MaxAttach. (See “Interfaces: Network Settings” on page 27.) Global Settings—Configure network settings that apply to all network adapters on the MaxAttach. (See “Global Settings: Network Configuration” on page 35.
Identification The MaxAttach must be given a name. Clients use this name to access the file shares that reside on the unit. The MaxAttach can be configured as a member of one of the following: A Microsoft NT 4 domain A Microsoft Active Directory domain A Workgroup. If no workgroups exist on the network (for example, if this is a Unix environment), this option should be selected and any arbitrary name used.
Figure 4 Server Appliance Identity page 3. In the text boxes provided, enter the appropriate Server appliance name (MaxAttach name) and domain-name system (DNS) suffix. 4. The DNS suffix is appended to the host name to create the fully-qualified machine name. 5. Specify whether the client computer will be part of a Workgroup or a Domain. 6. If the machine will be part of a domain, enter the User name and Password of the person who has permission to add client computers to the domain.
If you click OK, the MaxAttach will reboot and the Restarting page will appear. When the MaxAttach is back online, the Home Page of the Web UI will display and your changes will be in effect. If you click Cancel, the changes to the MaxAttach identity will not take effect until the next reboot.
characters, but doing so may prevent other users from finding your computer on the network. If your network is using the Microsoft DNS server, you can use any characters except periods. If other networking protocols are installed without TCP/IP, the server appliance name is limited to 15 characters.
host.reskit When a user enters an FQDN, the resolver queries DNS using that name. Likewise, when a user enters a multiple-label, unqualified name, the DNS resolver adds a terminating period and then queries DNS using that name. However, if you enter a single-label, unqualified name, or a multiple-label, unqualified name, and the name fails to resolve as an FQDN, the resolver systematically appends different DNS suffixes to the name that you entered, adding periods to make them FQDNs.
ignored. In such a case, neither is appended to the host name before the FQDN are submitted to DNS. Instead, the resolver appends each suffix from the search list in order, and then submits the name to the DNS server until the resolver finds a match or reaches the end of the list. For example, if you enter the name client, and the primary DNS suffix is eu.reskit.com, the resolver will first try client.eu.reskit.com, and then client.reskit.com.
If you switch to a new Active Directory and select Change primary DNS suffix when domain membership changes, the DNS suffix is updated to match the new Active Directory domain that you are joining. For example, suppose your current DNS suffix is MyMachine, and you join a new Active Directory domain called example.microsoft.com. The new DNS suffix, (example.microsoft.
many as 15 characters, but cannot contain any of the following characters: ; : " < > * + = \ | ? , To set or change the workgroup membership of the MaxAttach 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Identification. The Server Appliance Identity page (Figure 5) displays. Figure 5 Server Appliance Identity 3. Select the Workgroup radio button and enter the name of the workgroup to join. 4.
6. You will be asked to reboot the MaxAttach. You may accept the reboot, or cancel it. If you click OK, the MaxAttach will reboot and a page will appear indicating that the unit is restarting. After the MaxAttach is back online, you must reinitiate your browser, then return to the Home Page of the Web UI to see your changes in effect. If you click Cancel, the changes to the server appliance (MaxAttach) identity will not take effect until the next reboot.
CAUTION: When setting the name and domain membership of the MaxAttach and specifying the user with permission to join domain, you must enter the user name as domainname\username and the password as domainname\password. Interfaces: Network Settings Network Protocol Settings allow your computer to connect to other computers on a network in order to share information.
Figure 6 Network Adapters on Server Appliance IP Settings Each computer on the network must have a unique IP address to send and receive data. You can use the IP Address Configuration screen to have your MaxAttach automatically obtain the IP address configuration from the Dynamic Host Configuration Protocol (DHCP) server. You can also configure the address(es) manually. In addition, you can use the IP Address Configuration screen to specify one or more gateway addresses.
new IP address or wait until the DNS server is updated. To automatically set or change the IP settings 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Interfaces. 3. On the Object Selection table, select the network connection to modify. 4. On the Tasks list, select IP. The IP Address Configuration page (Figure 7) displays. Figure 7 IP Address Configuration 5.
If you choose to obtain the configuration from the DHCP server, click OK to save your changes and finish this task. To manually set or change the IP settings 1. In the IP address text box, type the IP address, then click Add. The metric indicates the cost of using the routes associated with this connection and becomes the value in the Metric column for those routes in the IP routing table. If there are multiple routes to a destination in the IP routing table, the route with the lowest metric is used.
1. In the Gateway and Metric text boxes, type the IP address of both the default gateway and the metric, then click Add. 2. Repeat step 1 for each default gateway you want to add. 3. When you are finished modifying the configurations on this screen, click OK to save the changes and finish this task. DNS Settings The domain-name system (DNS) is a static, hierarchical name service for TCP/IP hosts. The network administrator configures the DNS with a list of host names and IP addresses.
To set the MaxAttach to automatically obtain DNS information from a DHCP server 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Interfaces. 3. On the Object Selection table, select the network connection to modify. 4. On the Tasks list, select DNS. The DNS Configuration page (Figure 8) displays. Figure 8 DNS Configuration 5. Next to the Configuration option, select the Obtain configuration from DHCP server radio button. 6. Click OK.
3. From the Object Selection table, select the network connection to modify. 4. On the Tasks list, select DNS. 5. Next to the Configuration option (see Figure 8 on page 32), select the Configure manually radio button. 6. Enter the appropriate server name in the box next to the Add button, then click Add. 7. To add another DNS server, repeat step 5. 8. When you are finished adding DNS servers, click OK.
Note: The purpose of this property page is to allow you to enter the addresses of EXTERNAL WINS servers. The MaxAttach does not contain a WINS server. WINS-enabled clients are computers that can be configured to make direct use of a WINS server. Most WINS clients typically have more than one NetBIOS name that they must register for use with the network.
from a DHCP-enabled adapter. If you remove two WINS addresses and do not add at least one, DHCP will automatically assign WINS addresses. To change the WINS settings of the MaxAttach 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Interfaces. 3. On the Object Selection table, select the network connection to modify. 4. On the Tasks list, select WINS. The WINS Configuration page (Figure 9) displays. Figure 9 WINS Configuration 5.
suffixes and the LMHOSTS file to use. LMHOSTS can be used to resolve the names of any computer or device. Note that the DNS suffix used here applies when the MaxAttach is trying to resolve a host or domain name. To automatically set or change DNS suffixes 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Global Settings. The Global Network Settings page (Figure 10) displays. Figure 10 Global Network Settings 3.
4. Additionally, you may choose to Append primary DNS suffix and parent suffixes by marking the check box next to this option. 5. Click OK. To manually add specific DNS suffixes 1. On the Network Setup page, click Global Network Settings (see Figure 10). 2. Under DNS suffixes to use, select Append specific DNS suffixes. 3. In the text box next to the Add button, enter the DNS suffix you wish to add, then click Add. 4. The new entry will appear in the list box to the left of the Add button. 5. Click OK.
By default, the text box in this portion of the screen contains the current LMHOSTS configuration. 3. Edit the LMHOSTS file. 4. Click OK. LMHOSTS Files About Name Resolution In order for people to reach your site on an intranet, you must have a unique IP address that identifies your computer on the network. This address takes the form of a long string of numbers separated by dots (for example, 172.16.255.255).
the computer uses the replicator service and does not use WINS, LMHOSTS entries are required on import and export servers for any computers on different subnetworks participating in the replication. You can use Microsoft Notepad or any other text editor to edit the sample LMHOSTS.sam file that is automatically installed in the \Windows directory. The following rules apply for entries in the LMHOSTS file: Each entry should be placed on a separate line.
Key wo rd D e f i n i t io n #PRE A dd e d af t e r an e nt r y to c au se t h at e nt r y t o b e p re l o a d e d i n t o t he n am e c ac h e. # P R E e nt r i e s i n t he L M H O S T S f i l e a re l o oke d u p a n d c ac h ed p r i or t o WI N S l oo k -u p. # P R E mu s t b e a p p e n d e d f o r e nt r ie s th at a ls o appe ar in # I N C LU DE s t at em e nt s; o th e r w i se, t he e nt r y i n # I N C LU DE i s i g n ored .
# E N D_ A LT ER N AT E U s ed t o m a r k t he en d of a n # I N C LU DE g ro up i n g. \0x nn S u p p or t f or n on p r i n ti n g c ha r ac t er s i n N e t B I O S na me s. E nc l os e t he N e tB I OS n am e i n q u ot at i o n mar k s a nd u se \ 0 x n n h ex a d e ci m al n o ta ti o n t o s p e ci f y a h exa de ci m al valu e f o r t h e c ha r ac t er.
#INCLUDE \\trey\public\LMHOSTS LMHOSTS from this server #adds #END_ALTERNATE In the preceding example: The servers named localsrv and trey are preloaded so they can be used later in an #INCLUDE statement in a centrally maintained LMHOSTS file. The server named "appname \0x14" contains a special character after the 15 characters (including blanks) in its name, so its name is enclosed in quotation marks. The server named popular is preloaded, based on the #PRE keyword.
statements are preloaded into the cache at system startup time and are not accessed later). Remember that comment lines add to the parsing time, because each line is processed individually. Change Administrator Password The MaxAttach comes with a set of default accounts. Only the Administrator account has administrative privileges. The default User Name is: Admnistrator, and the Password is blank (none).
2. On the Network Setup page, click Change Administrator Password. 3. Enter the current administrator password in the Current password box. 4. Enter the new administrator password in the New password box. Note: The new administrator password must conform to any password complexity rules in effect for the domain to which the MaxAttach belongs. 5. Re-type the new administrator password in the Confirm new password box. 6. Click OK.
To change the Administration Web Site properties 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click Administration Web Server. The Administration Site Properties page (Figure 11) displays. Figure 11 Administration Site Properties 3. On the General tab of the Administration Site Properties page: a. Specify whether to use All IP Addresses or Just this IP Address. b. If you choose to use Just this IP Address¸ use the drop-down list to select the IP address to use. c.
NIC Configuration CAUTION: The MaxAttach NAS 4100 comes with default NIC Configuration settings, designed for optimum use. Maxtor Corporation highly recommends that these setting not be changed. Adaptive Load Balancing The default setting for your NIC configuration is Team with Adaptive Load Balancing. This design ensures optimum performance in NIC failover support, when both network ports are connected to the same subnet.
Figure 12 PROSet NIC Team Configuration The Adapters in a Team status box (Figure 13) provides the following details: Adapter: Lists each adapter by name. Priority: Lists the priority status for the adapters in a team (if you have specified a priority). You can specify that an adapter serve as the Primary or Secondary adapter within the Adapter Fault Tolerance function of a team. The Status column lists the following states: Active: The currently active adapter(s) in a team.
Figure 13 Adapters in a team The Team Information section lists the following details: IP Address: Lists the IP Address for the adapter. Team Type: Lists the team type for the adapter highlighted in the Adapters in a Team status box. Note: When you add a new team or if you delete a team from the Network Control Panel, the frame type for each adapter in the team reverts to Auto. This is important only if you need to manually set the frame type on your adapters.
To break team configuration 1. On the primary menu bar, click Network Setup. 2. On the Network Setup page, click NIC Configuration. 3. Follow the prompts and reenter your password. The Adapters in a team window displays (see Figure 13 on page 48). 4. Select the Team adapter in the component tree. 5. From the Action menu, select the Remove command. 6. Click OK to commit the new configuration. To restore team configuration 1. On the primary menu bar, click Network Setup. 2.
8. Click Finish, then OK to exit.
3 Disks and Volumes From this page you can perform the following tasks on the MaxAttach: Configure the properties of individual disks and volumes. (See “Configure Disk and Volume Properties” on page 51.) Configure disk quotas. (See “Disk Quotas” on page 54.) Configure Disk and Volume Properties Your MaxAttach is pre-configured in RAID5 for optimum use in most environments, and it is recommended that you maintain this default configuration. WARNING: The first 3GB on each disk drive is reserved.
limited to 2 concurrent connections. If the user attempts to open more than 2 connections, a message will be displayed. To manage disks and volumes on the MaxAttach 1. On the primary menu bar, select Disks and Volumes. 2. On the secondary menu, select Disks and Volumes. 3. Log in to the Terminal Services Client (TSC). The Disk Management page (Figure 14) displays. Figure 14 Disk Management 4. Delete any existing shares on any disk you wish to modify.
5. Delete the existing volume(s) on the disk. (Right click the volume and select Delete Volume.) Do not delete the first 3 GB volume. 6. Confirm the deletion. The volume changes to “Unallocated.” 7. Right click the unallocated space and create a new volume with the configuration you desire.
The status area at the bottom of the Disk Management window shows the progress of the new configuration. When complete the status will be “Healthy.” 9. When you are finished, close the application and log out of TSC. Note: It may take a few moments for the Terminal Services session to log off when closing the application. Terminal Services Client TSC is the tool used to manage disks and volumes on your MaxAttach. TSC supports only two concurrent connections.
warning level specifies the point at which a user is nearing his or her quota limit. For example, you can set a user's disk quota limit to 50 megabytes (MB), and the disk quota warning level to 45 MB. In this case, the user can store no more than 50 MB of files on the volume. If the user stores more than 45 MB on the volume, you can have the disk quota system log a system event You also can specify that users can exceed their quota limit.
enabled volume, default values for disk space limit and warning level are automatically assigned by the quota system. This page is used to configure default quota values. To enable or disable quota management on a volume 1. On the primary menu bar, click Disks and Volumes. 2. On the secondary menu, select Quota Management. The Volumes on Server Appliance page (Figure 15) displays. Figure 15 Volumes on Server Appliance 3. From the Object Selection table on the Disk Quota page, select the volume to manage.
Quota Entries The Quota Entries page allows you to add, delete, or configure disk quotas for any user of the MaxAttach. Quotas are managed using the Object Selection table, which has the following parts: Logon Name — This column displays the logon name of each user with registered access to the MaxAttach. Status — This column indicates whether or not the user has exceeded the assigned quota limit. Amount Used — This column indicates the amount of disk space currently being used by a given user.
Quota Management page AND if Log event is checked on the Quota Entries property page. If the Log event option is not checked, no warning will be generated and this column will remain empty. Typically the Warning Limit value is set slightly below the Quota Limit value. Use the Object Selection table to select a user, then click the task you want to perform from the Tasks list. To set or change quota entries on the MaxAttach 1. On the primary menu bar, click Disks and Volumes. 2.
Figure 16 Quota Entries for Volume Adding Quota Entries To add a new quota entry 1. On the Tasks list, select New…. The New Quota Entry page (Figure 17) displays. Figure 17 New Quota Entry 2. Select a local user from the list box, or type the name of a domain account in the text box (using the ).
To allow unlimited disk usage Click the Do not limit disk usage radio button. — OR — To limit disk space Click the Limit disk space to radio button. In the text box, enter a numerical value to specify the amount of disk space to assign to a particular user or group. Use the drop-down box to indicate kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB), petabytes (PB), or exabytes (EB).
Modifying Quota Properties To modify the properties of a quota entry 1. On the Quota Entries page for the selected volume, select a user account from the Logon name field of the Object Selection table. 2. On the Tasks list, click Properties. The Quota Entry for User page (Figure 18) displays. Figure 18 Quota Entry for User 3. On the Quota entry for user page, do one of the following: To allow unlimited disk use Click the Do not limit disk use radio button. — OR — To limit disk space a.
c. Enter the amount of disk space which, when filled, will trigger a warning to the user or group member that she is near her disk capacity limit. Use the drop-down box to indicate kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB), petabytes (PB), or exabytes (EB). d. Click OK.
4 Manage Services The service management page allows you to enable and start, disable and stop, or configure relevant network services. The Manage Services page displays the Object Selection table. The Object Selection table has the following parts: Name — This column lists each service by name. To enable, disable, or change the properties of a given service, click the radio button next to the service you want to modify. Status — This column indicates that the service is Running, or is Paused.
Enable Services Microsoft recommends that you enable only the necessary network components. Limiting the number of enabled network components will enhance the performance of other network services. Additionally, if a problem is encountered with a network or dial-up connection, the system will attempt to establish connectivity by using every network protocol that is installed and enabled. By only enabling the services that your system can use, the MaxAttach can conserve resources and perform better.
4. Click OK to confirm your choice. Disable Services To disable a network service 1. On the primary menu bar, click Services. 2. On the Object Selection table, select the service to disable. 3. On the Tasks list (adjacent to the Object Selection table), click Disable. 4. Click OK. Configure Service Properties Use the property page of the designated service to configure the desired network services. To configure network service properties 1. On the primary menu bar, click Services. 2.
Figure 20 HTTP Service Properties For instructions about configuring a specific service, see the appropriate topic: “NFS Service” on page 66 “FTP Service” on page 83 “Web (HTTP) Service” on page 88 “NetWare Service” on page 94 “Indexing Service” on page 94 “Mac Service” on page 95 “Telnet Service” on page 95 NFS Service You can use the NFS Service option to configure the MaxAttach to act as an NFS server.
Procedure Call (ONC-RPC). Remote calls from clients appear to run locally, but remote calls actually run on the NFS server. The Open Network Computing External Data Representation (ONCXDR) protocol ensures portable data transmission between NFS clients and the NFS server. You can use the NFS Service to manage NFS Client Groups, NFS Locking, and NFS User and Group mappings. NFS Shares, however, are created from the Folders and Shares section of the Web UI.
computers. From the viewpoint of the user on a client computer, the mounted files are indistinguishable from local files. The NFS Service uses the Open Network Computing remote procedure call (ONC RPC) protocol to implement the NFS protocol. The NFS Service also uses the external data representation (XDR) protocol to ensure portable data transmission between NFS clients and the MaxAttach. UNIX computers follow advisory locking for all lock requests.
NFS Client Groups From the NFS Client Group page, you can create, delete, or edit NFS client groups. See the following subjects: “Adding NFS Client Groups” on page 69 “Editing NFS Client Groups” on page 70 “Removing NFS Client Groups” on page 72 Adding NFS Client Groups To add an NFS client group 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select NFS. 3. On the NFS Service page, click Client Groups. The NFS Client Groups page (Figure 21) displays.
The New NFS Client Group page (Figure 22) displays. Figure 22 New NFS Client Group 5. On the New NFS Client Group page, enter the group name to add in the Group name text box. 6. In the text box next to the Add button, enter the IP address or computer name you want to add to the group. 7. Click Add. 8. Click OK. Editing NFS Client Groups To add members to an NFS client group 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select NFS. 3.
The Edit NFS Client Group page (Figure 23) displays. Figure 23 Edit NFS Client Group 6. On the Edit NFS Client Group page, enter the IP address or computer name of the member to add to the group. 7. Click Add. 8. Click OK. To remove members from an NFS client group 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select NFS. 3. On the NFS Service page, click Client Groups. (See Figure 21 on page 69.) 4. On the Object Selection table, select the group to edit. 5.
8. Click OK. Removing NFS Client Groups To remove an NFS client group 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select NFS. 3. On the NFS Service page, click Client Groups. (See Figure 21 on page 69.) 4. On the Tasks list, click Delete. 5. On the Delete NFS Client Group page, click OK to confirm the deletion. NFS Locks NFS locks allow a process to have exclusive access to all or part of a file. File locking is implemented both on the MaxAttach and the client.
The NFS Locks page (Figure 24) displays. Figure 24 NFS Locks 4. On the NFS Locks page, from the Current locks list box, select the client for which you want to release the NFS locks. 5. In the Wait period text box, enter the number of seconds after restarting that the MaxAttach waits to re-establish a file lock with a client. 6. Click OK.
accounts even though the user and group names in both environments may not be identical. Perhaps most important, User and Group Mappings lets you maintain a single mapping database for the entire enterprise. In addition to one-to-one mapping between Windows and UNIX user and group accounts, User and Group Mappings permits one-to-many mapping. This lets you associate multiple UNIX accounts with a single Windows account, or multiple Windows accounts with a single UNIX account.
1. On the primary menu bar, select Services. 2. On the Manage Services screen, select NFS Service radio button, then click on Properties in the Tasks column. 3. On the NFS Service page, click User and Group Mappings. 4. On the NFS Service page, click User and Group Mappings. The User and Group Mappings page (Figure 25) displays. Figure 25 User and Group Mappings To configure for using a Network Information Service (NIS) server a. On the General tab, select the Use NIS server radio button. b.
d. To specify the length of time the MaxAttach waits to refresh the user and group information, enter the time in the Hours and Minutes text boxes. e. Click OK. To configure for using password and group files a. Select the Use password and group files radio button. b. In the Password file text box, enter the name of the password file to use. (This is a 'passwd' format file from a UNIX system containing all the UNIX user accounts that could be mapped). c.
domain. If no match exists for a user name in either place, that user is not mapped. Note: To access this page you must have entered a valid NIS server name on the General tab. To enable simple maps 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select NFS. 3. On the NFS Service page, click User and Group Mappings. 4. Click the Simple Maps tab (Figure 26). Figure 26 Simple Maps tab 5. Check the Enable simple maps check box. 6.
user and group names in both environments are not identical. User and Group mapping also let you set up oneto-one, one-to-many, or many-to-one inter- and cross-platform mappings among Windows and UNIX users and groups. For example, a Windows user name could be mapped to several UNIX user names, or a UNIX group could be mapped to one or more Windows user accounts. Explicit user maps can also be used when the same person has different user names on Windows and UNIX accounts.
Figure 27 Explicit User Maps 5. From the Windows domain drop-down list, select the Windows domain containing the user to be mapped. 6. In the NIS Domain text box, enter either the specific NIS domain to map, or leave the default NIS domain name. 7. Optionally, enter the name of the NIS server to map in the NIS Server (optional) text box. 8. Click the list Windows Users button to populate the Windows users list box. 9. Click the list UNIX Users button to populate the Unix users list box. 10.
Note: You can map users from one Windows domain to more than one UNIX domain, and vice versa. To set one of the mappings as primary for a given user: 11. Select the mapping from the Explicitly mapped users list box. 12. Click Set primary. 13. Click OK. To delete explicit user maps 1. Follow steps 1-4 above to navigate to the Explicit User Maps page. 2. In the Explicitly mapped users list box, select the user mapping to delete. 3. Click Remove. 4. Click OK.
Group Maps option lets you maintain a single mapping database for the entire enterprise. To create explicit group maps 1. From the primary menu bar, select Services. 2. From the secondary menu bar, select NFS. 3. From the NFS Service page, click Group and Group Mappings. 4. Click the Explicit Group Maps tab (Figure 28). Figure 28 Explicit Group Maps 5. From the Windows domain drop-down list, select the Windows domain to map. 6.
8. To populate the Windows groups list box, click the List Windows Groups button. 9. To populate the Unix groups list box, click the List UNIX Groups button. 10. Select a group from each group, then click Add. The mapped groups will appear in the Explicitly mapped groups list box. Note: You can map groups from one Windows domain to more than one UNIX domain, and vice versa.
FTP Service Because the FTP server service supports all Microsoft Windows FTP client commands, when a Windows Powered MaxAttach is running the FTP server service, other computers using the FTP utility can connect to the server and transfer files. On the other hand, non-Microsoft versions of FTP clients might contain commands that are not supported by the FTP server service. The FTP server service is integrated with the Windows security model.
subcommand. When the FTP sub-environment is running, it is indicated by the FTP command prompt. Related Topics “FTP Share Properties” on page 131 “Adding a Windows or UNIX Share” on page 122 “Removing a Windows or UNIX Share” on page 124 “Modifying Windows or UNIX Share Properties” on page 126 “Initial MaxAttach Configuration” on page 13 FTP Logging You can log incoming FTP connections in to the FTP log by enabling FTP Logging.
The FTP Service Properties page (Figure 29) displays. Figure 29 FTP Service Properties 3. Select the Logging tab. 4. Check the Enable logging check box, then click OK. FTP Anonymous Access Allowing anonymous access to the FTP server enables users to connect with the user name anonymous (or ftp, which is a synonym for anonymous). A password is not necessary, but the user is prompted to supply an e-mail address as the password. By default, anonymous connections are not allowed.
To configure FTP anonymous access 1. On the primary menu bar, select Services. 2. On the secondary menu bar, select FTP. —OR— Select the FTP Service option from the Object Selection table, then click Properties. The FTP Service Properties dialog box (Figure 29 on page 85) opens. 3. Select the Anonymous Access tab (Figure 31). Figure 30 Anonymous Access tab of FTP Service Properties 4.
When only anonymous FTP connections to the server can be made, users cannot connect to the FTP server using a Windows user name and password. To configure the FTP Server service for this setting, make sure both the Enable anonymous connections and the Allow anonymous access only boxes are selected. If anonymous connections are allowed, you must supply the Windows user name and password that will provide anonymous access to the FTP server.
Figure 31 Messages tab of FTP Service Properties 4. In the Welcome message memo box, type the message that will greet users when they connect to the MaxAttach. 5. In the Exit message memo box, type the message that will appear when users disconnect from the MaxAttach. 6. Click OK.
“World-Wide Web Server” on page 89 “Network Protocol Overview: HTTP” on page 90 “HTTPS Creating a Secure Connection” on page 91 World-Wide Web Server The Web is a network within the Internet consisting of: 1) servers that provide information in hypertext format, and 2) clients that relay user input to the server, which displays information on the servers in the user-specified format.
can provide the URL, or you can link to it from a document you make available to Web users. The HTTP server service supports anonymous access, as well as basic and Windows authentication. Related Topics “HTTP Share Properties” on page 133 Network Protocol Overview: HTTP The Hypertext Transfer Protocol (HTTP) is the Internet protocol used by World Wide Web browsers and servers to exchange information.
“Adding a Windows or UNIX Share” on page 122 “Removing a Windows or UNIX Share” on page 124 “Modifying Windows or UNIX Share Properties” on page 126 “Initial MaxAttach Configuration” on page 13 HTTPS Creating a Secure Connection There are several administrative tasks you can perform via the Web UI (such as setting administrative and user passwords) for which you will want a secure connection.
Figure 32 Terminal Services Client window 4. On the TSC desktop, right-click My Computer, and select the Manage item from the pop-up menu. The Computer Management window opens (Figure 33).
Figure 33 Computer Management 5. In the left column of the Computer Management window, expand the Services and Applications node. 6. Expand the Internet Information Services node. 7. Select the site for which you want a secure connection, and right-click. Select Properties from the pop-up menu. The Default FTP Site Properties window opens. 8. Select the Directory Security tab (Figure 34).
Figure 34 Directory Security tab of Web Site Properties 9. In the Secure Communications portion at the bottom of the dialog box, click the Server Certificate button. 10. Follow the instructions of the Web Server Certificate Wizard. NetWare Service For Netware Service Help see file, fnpw.chm in Terminal Services mode, in control panel. Indexing Service There are no configurable properties for the Indexing Service.
Mac Service There are no configurable properties for the Mac Service. Telnet Service There are no configurable properties for the Telnet Service. SNMP Service Network Protocol Overview: SNMP The simple network management protocol (SNMP) service supports computers running TCP/IP and IPX protocols. It is an optional service that can be installed after the TCP/IP protocol has been successfully configured.
does not need to run on the same host as the SNMP agent. The SNMP management system requests information from a managed computer (called an SNMP agent) such as the amount of hard disk space available or the number of active sessions. The SNMP management system can also initiate a change to the configuration of an SNMP agent. However, this is rare because most clients have read-only access. An SNMP agent. The SNMP agent responds to SNMP management system requests for information.
SNMP Service Configuration This feature opens the Windows 2000 Services window from which you can configure the SNMP service. To configure the SNMP service 1. On the primary menu bar, select Network Setup. 2. Select the SNMP Service Configuration option. 3. Follow the prompts and re-enter your User name and Password. The Services window (Figure 35) opens. Figure 35 Services window 4. Double-click SNMP Service in the list of services.
The SNMP Service Properties dialog (Figure 36) opens. Figure 36 SNMP Service Properties 5. Edit values as needed on the Agent, Traps, and Security tabs. CAUTION: Do not alter values on the other tabs. For information on specific fields in the tabs, right-click a field to view “What's This?” help (or select a field and press F1). 6. Click OK. 7. Close the Services window to close the Terminal Services Client Session.
5 Users and Groups From this page, you can create, edit, and delete local users and groups on the MaxAttach. You can also change the members of each group. If the MaxAttach is a member of a domain, you will not want to create any users on the MaxAttach itself. The primary purpose of this page is to add one or more domain members to the local administrators group. You may also want to use domain user and group accounts to control access to resources on the MaxAttach.
Users and groups are important in Microsoft Windows Powered security because you can assign permissions to limit the ability of users and groups to perform certain actions. A permission is a rule associated with an object (usually a file, folder, or share) that regulates which users, and in what manner those users, can access the object. Any local or domain user who is a member of the local Administrator group on the MaxAttach has administrative privileges on the MaxAttach.
A user name cannot be identical to any other user or group name on the computer being administered. A user name can contain up to 20 uppercase or lowercase characters except for the following: " / \ [ ] : ; | = , + * ? < >. Additionally, a user name cannot consist solely of periods (.) or spaces. In the Password and Confirm password text boxes, you can type a password containing up to 127 characters.
Figure 37 Local Users on Server Appliance 3. On the Tasks list, click New. The Create New User dialog (Figure 38) opens. Figure 38 Create New User 4. Enter the information for the new user account. Note: In the Home Directory field, you can select the Local Path checkbox, then specify the path for the home directory of the user.
name you enter in the User name: field. Access rights for the new directory are automatically set to “Do not share this folder” for all protocols. For information on modifying access rights, see “Modifying Windows or UNIX Share Properties” on page 126, or “Modifying Macintosh or NetWare Share Properties” on page 139. 5. Click OK.
To remove a user account 1. On the primary menu bar, select Users and Groups. 2. Select Users. (See Figure 37 on page 102.) 3. In the Object Selection table, select the user account you wish to remove. 4. In the Tasks list, click Delete. 5. In the Delete User dialog, verify that the user identified matches the user account you wish to delete, then click OK to delete the account. Related Topics “Initial MaxAttach Configuration” on page 13 Setting a User Password To set the User Password 1.
Figure 39 Set Password 5. Enter and confirm the new password. 6. The new password must conform to any password complexity rules in effect for the domain to which the MaxAttach belongs. 7. Click OK. Related Topics “Initial MaxAttach Configuration” on page 13 Modifying User Properties User properties include the User name, Full name, and Description. From the User Properties page, you can also enable or disable a user account. To access the User properties 1.
5. Make any changes to the User properties you require, then click OK. Related Topics “Initial MaxAttach Configuration” on page 13 Manage Local Groups A local user or group account is an account that exists on the MaxAttach and can be granted permissions from your computer. The MaxAttach can also be configured to allow access to domain users and groups. Domain users and groups are users and groups that exist in a Microsoft Windows NT 4 or Microsoft Active Directory domain.
members would then have administrative privileges on the MaxAttach. Section topics This section contains the following topics: “Adding a Group Account” on page 107 “Removing a Group Account” on page 109 “Modifying Group Properties” on page 110 Adding a Group Account To add a group account 1. On the primary menu bar, select Users and Groups. 2. Click Groups. The Local Groups on Server Appliance page (Figure 40) displays. Figure 40 Local Groups on Server Appliance 3. In the Tasks list, click New.
The Create New Group dialog (Figure 41) opens. Figure 41 Create New Group 4. On the General tab, enter the name and description of the group to add. 5. On the Members tab (Figure 42): Select a local group from the list on the bottom right, then click the adjacent Add button. — OR — In the Add user or group text box, type the domain and group name () of a domain group, or a domain user account () then click adjacent Add button.
Figure 42 Create New Group (Members tab) 6. Click OK. Related Topics “Initial MaxAttach Configuration” on page 13 Removing a Group Account You can remove any group account that you have created. A group account that has been removed, however, cannot be re-created. To remove a user account 1. From the primary menu bar, select Users and Groups. 2. Click Groups. (See Figure 40 on page 107.) 3. In the Object Selection table, select the group account you wish to remove.
4. In the Tasks list, click Delete. 5. In the Delete Group dialog, verify that the group identified is the group account you wish to delete, then click OK to delete the group account. Related Topics “Initial MaxAttach Configuration” on page 13 Modifying Group Properties The Group Properties page displays the General tab and the Members tab. Use the General tab to set or modify the group name and description. Use the Members tab to add or remove users and groups.
To set or modify group membership 1. On the primary menu bar, select Users and Groups. 2. Select Groups. (See Figure 40 on page 107.) 3. From the list of groups, select the group account you wish to modify. 4. In the Task list, click Properties (see Figure 43 on page 110), then click Members (Figure 44). Figure 44 Group Properties (Members tab) 5. The Members list on the left shows the current local members of the group.
Select a local group from the list on the bottom right, then click the adjacent Add button. — OR — In the Add user or group text box, type the domain and group name () of a domain group, or a domain user account () then click the adjacent Add button. To remove a member From the Members tab 1. Select the user name from the Members list on the left. 2. Click Remove.
6 Folders and Shares A folder on your MaxAttach can be shared with others on the network, whether those computers are running a Microsoft Windows operating system or a UNIX operating system. This MaxAttach supports the following methods of sharing folders: CIFS — The Common Internet File System protocol is used by clients running a Windows operating system. (See “CIFS Overview” on page 163.) NFS — The Network File System protocol is used by clients running UNIX.
“Manage Windows and UNIX Shares” on page 121 “Manage Macintosh and NetWare Shares” on page 133 Manage Folders To manage folders 1. From the Folders and Shares page, select Folders to open the Volumes on Server Appliance page. The Volumes on Server Appliance dialog (Figure 45) opens. Figure 45 114 Volumes on Server Appliance The Volumes on Server Appliance page allows you to create, open, delete, or configure a number of network volumes.
Total Size — This column shows the total size of the volume. Free Space — This column shows the amount of free space available on the volume. 2. Select the volume for which you want to view or manage folders or shares, and click Open in the Tasks list. The Folders on Server Appliance page (Figure 46) allows you to create, open, delete, or configure a number of network folders.
R = Read only A = Ready for archiving H = Hidden C = Compressed S = System folder. When the page is initially displayed, the Object Selection table contains a list of root folders for each volume. Use the Object Selection table to select a folder, then click on the task to perform from the Tasks list to perform the appropriate task. Navigating among folders You can select a folder by clicking the radio button next to the folder name.
Opening a Folder To open a folder 1. On the primary menu bar, select Folders and Shares. 2. On the secondary menu bar, select Folders. (See Figure 45 on page 114.) 3. Use the Object Selection table to navigate to the folder you want to open. 4. From the Task list, click Open. The Folders on Server Appliance page (Figure 46) opens, with an Object Selection table listing all the subfolders specific to the folder you selected. Adding a Folder You can create as many new folders as you need on the MaxAttach.
Figure 47 Create new folder 3. Enter the name of the new folder in the New folder name text box, then click OK. The Folders on Server Appliance page of the parent directory (Figure 46) displays, listing all the subfolders of the folder selected. 4. The Object Selection table now includes the folder you added. If your new folder is not immediately apparent in the table, scroll through the list to find it. Removing a Folder You can remove any folder you have created on the MaxAttach. To delete a folder 1.
3. On the Delete Folder page, verify the folder indicated is the one you want to remove, then click OK. The Folders on Server Appliance page of the parent directory displays, listing all the subfolders of the folder selected. The Object Selection table now no longer includes the folder you added. 4. Scroll through the list to verify the removed folder is no longer listed.
Figure 48 Folder Properties 3. On the General tab, in the Name text box, enter the new folder name. 4. Click OK. To compress a folder 1. Use the Object Selection table to navigate to the directory to which you want to add the new folder. 2. In the Tasks list, click Properties. The Folder Properties page displays. 3. On the Compress tab, check the Compress contents of this folder to save space check box. 4.
Navigating Among Folders Use the Object Selection table to navigate among folders. For every folder which has subfolders, there will be an Open task in the Tasks list. For ever folder which has a parent folder (that is, for ever folder that is, itself, a subfolder) there will be an Up task in the Tasks list. To navigate among folders 1. On the primary menu bar, select Folders and Shares. 2. On the secondary menu bar, select Folders. (See Figure 48 on page 120.) 3.
Shared Folder — This column lists each shared folder by name. To create, open, delete, or configure the properties of a given share, click the radio button next to the name of the share you want to modify. Shared Path — This column displays the share path. Type — This column indicates the share type: W = Windows (CIFS) U = UNIX (NFS) F = FTP H = HTTP (WebDAV) Description — This column displays a brief description of the share, if one has been provided.
protocols also support the inclusion of a comment or brief description of the share. Additionally, you must enable at least one of the available protocols. While a single user interface is provided to create a share for all protocols, in actuality, a separate share is created for each protocol. You can remove a share for one protocol without removing the share for the others, however, this is potentially confusing and has to be done carefully. To add a Windows or UNIX share 1.
Figure 50 Create New Share 4. On the General tab, enter the Share Name, Share Path, (and if desired) a brief description of the share in the Comment field. Note: The Comment is ignored for NFS, FTP, and HTTP shares. 5. Under Accessible from the following clients, check the appropriate box(es) to specify which types of protocols to enable. 6. Use the protocol tabs to configure the specific properties of each type of share.
To remove a share (all protocols) 1. On the primary menu bar, select Folders and Shares. 2. Select Windows and UNIX Shares. 3. On the Shared Folders on Server Appliance page (Figure 49 on page 123), select the share to remove in the Object Selection table. 4. In the Tasks list, click Delete. A confirmation dialog appears. 5. Click OK to confirm the deletion, or click Cancel to keep the share. To remove specific protocols 1. On the primary menu bar, select Folders and Shares. 2.
Figure 51 Share Properties 5. Uncheck the protocol(s) to remove from the share. 6. Click OK to confirm the deletion, or click Cancel to keep the share. Modifying Windows or UNIX Share Properties Use the Shared Folders window to view and modify share properties. To modify Windows or UNIX share properties 1. On the primary menu bar, click Folders and Shares. 2. Select Windows and UNIX Shares. 3.
5. Change values as needed, including the name, path, and description of the share, and the type(s) of client from which the share is accessible. 6. Click the protocol tabs to open a page for configuring the specific properties of each type of share. Before you can open any protocol tab, you must check the box next to the corresponding option under Accessible from the following clients.
Click the Maximum allowed radio button to allow as many people to log on to the MaxAttach as it can handle. — OR — Click the Allow ______ users radio button, then specify the number of users to allow. If you allow files to be cached in the shared folder, use the Setting drop-down list to specify the caching option to use. The caching options are described in “CIFS Overview” on page 163. Permissions You may also set permissions for users or groups who are granted or denied access to the MaxAttach.
4. Use the Deny drop-down list to deny a level of control to the specified users and groups in the Permissions list. 5. To remove a user or group from the Permissions list, highlight the name of the user or group in the list, then click Remove. 6. Click OK to save the changes. NFS Share Properties Use this page to specify which NFS clients are granted access to each share. Access can be granted or denied on the basis of client host name.
4. In the Tasks list, click Properties…. 5. On the General tab (Figure 51 on page 126), enter the Share name, and Share path. Under the Accessible from the following clients: prompt, check the Unix (NFS) box. 6. Select the NFS tab. 7. Select the desired machine or group from the list on the left, or type an NFS Client appliance name in the text box on the right, then click Add. 8.
7. Select the desired client appliance or client group from the list box in the center, then click Remove. 8. Click OK. Related Topics “NFS Service” on page 66 FTP Share Properties Use this page to specify which FTP clients are granted access to each share. Access can be granted or denied on the basis of client host name. To allow clients permission to an FTP share 1. On the primary menu bar, select Folders and Shares. 2. On the secondary menu bar, select Windows and UNIX Shares. 3.
9. Specify permissions. You may choose to allow read-only, write-only, or read/write permissions. Check the Read check box to allow read access. Check the Write check box to allow write access. 10. Click OK. 11. Select the FTP tab. 12. On the FTP tab Check the Read check box to allow read access. Check the Write check box to allow write access. You may choose to allow read-only, write-only, or read/write permissions. 13. Click OK. To log client visits to an FTP share 1.
HTTP Share Properties Use this page to specify which HTTP clients are granted access to each share. Access can be granted or denied on the basis of client host name. Access can also be granted or denied on the basis of client groups, where a client group contains one or more client host names. To allow clients permission to an HTTP share 1. On the primary menu bar, select Folders and Shares. 2. On the secondary menu bar, select Shares. 3.
1. On the primary menu bar, select Folders and Shares. 2. Select the Macintosh and NetWare Shares option. 3. Follow the prompts and re-enter your User name and Password. The Shared Folders window (Figure 52) opens. Figure 52 Shared Folders The Object Selection table displays the following columns: Shared Folder — This column lists each shared folder by name. To create, open, delete, or configure the properties of a given share, click the radio button next to the name of the share you want to modify.
Type — This column indicates the share type; possibilities are: Windows (CIFS) UNIX (NFS) NetWare (NCP) Macintosh (AFP) FTP HTTP (WebDAV) # Client Redirections—This column shows the number of client machines currently connected to the share. Comment — This column displays a brief description of the share, if one has been provided. 4. Use the Object Selection table to select a share, then select the action you want to perform from the Action menu. 5.
Adding a Macintosh or NetWare Share To create a share, you must supply a share name that is unique across all shares, the share path (that is, the directory on the MaxAttach to be shared). Some protocols also support the inclusion of a comment or brief description of the share. Additionally, you must enable at least one of the available protocols. While a single user interface is provided to create a share for all protocols, in actuality, a separate share is created for each protocol.
Figure 53 Create Shared Folder 5. In the Create Shared Folder wizard, specify the Folder to Share and the Share name. 6. Use the check boxes to specify the clients for which the share applies. Share Name creates a new NetWare volume if you select the NetWare client. Share Description only applies to Windows client. Macintosh Share Name lets you specify a different name that only Macintosh users will see if you select the Macintosh client. 7. Click Next. 8.
10. Close the Shared Folders window to close the Terminal Services Client Session. Removing a Macintosh or Netware Share When you remove a share, access to the share is removed, yet the actual files remain on the MaxAttach. To remove a Macintosh or Netware share (all protocols) 1. On the primary menu bar, select Folders and Shares. 2. Select the Macintosh and NetWare Shares option. 3. Follow the prompts and re-enter your User name and Password. 4.
Modifying Macintosh or NetWare Share Properties Use the Shared Folders on Server Appliance page to view and modify share properties. To modify Macintosh or NetWare share properties 1. On the primary menu bar, select Folders and Shares. 2. Select the Macintosh and NetWare Shares option. 3. Follow the prompts and re-enter your User name and Password. 4. In the Shared Folders Window (Figure 52 on page 134), select the share to modify in the Object Selection table. 5. In the Action menu, select Properties.
Figure 54 Properties 6. Modify properties as needed; use the Share Permissions tab to set permissions for users, computers or groups. 7. Close out of the Properties dialog box 8. Close the Shared Folders window to close the Terminal Services Client Session.
7 Maintenance From the main Maintenance page, users can perform the following general MaxAttach maintenance tasks: Set the date and time on the MaxAttach. (See “Date and Time” on page 141.) Shutdown or restart the MaxAttach. (See “Shutdown Appliance” on page 142.) Backup or restore the MaxAttach system partition. (See “Back-up and Restore Tool” on page 143.) View and clear event logs. (See “Logs” on page 145.
1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, click Date and Time. The Set Date and Time dialog (Figure 55) opens. Figure 55 Set Date and Time 3. Select the Year, Month, Date, Time, and Time Zone. If you want the MaxAttach to automatically adjust for daylight savings time, you can also enable that function here. 4. Click OK.
To shut down or restart the MaxAttach 1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, click Shutdown. The Shutdown Server Appliance dialog (Figure 55) opens. Figure 56 Shutdown Server Appliance 3. Select the radio button next to the description of the desired behavior, then click OK. The Confirmation page displays. 4. Click OK to confirm your decision After the MaxAttach reboots, you must close and reopen your browser to return to the Home page of the Web UI.
To back up or restore the MaxAttach partition 1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, select System Backup/Restore, then log in to the Terminal Services Client (TSC). The Backup window (Figure 57) opens. Figure 57 Backup window 3. Select a wizard and follow the steps. 4. When you are finished, close the application and log out of TSC. Note: It may take a few moments for the Terminal Services session to log off when closing the application.
to another page during an open session, the client will be disconnected but the session will be preserved. While logged-in to TSC, you can access all of the Windows 2000 functionality, including the Windows 2000 Help files. Logs A log file is a file that stores messages (event logs) generated by an application, service, or operating system. These messages are used to track the operations performed. Log files are usually plain text (ASCII) files and often have a .log extension.
To manage Application Logs 1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, select Logs. 3. On the Logs page, select Application Log. The Application Log dialog (Figure 58) opens. Figure 58 Application Log For more information, see “Manage Logs” on page 148. System Log The system log contains events logged by the Windows 2000 system components. For example, the failure of a driver or other system component to load during startup is recorded in the system log.
3. On the Logs page, select System Log. The System Log dialog (Figure 59) opens. Figure 59 System Log For more information, see “Manage Logs” on page 148. Security Log The security log can record security events such as valid and invalid logon attempts as well as events related to resource use such as creating, opening, or deleting files. An administrator can specify what events are recorded in the security log.
Figure 60 Security Log For more information, see “Manage Logs” on page 148. Manage Logs A log file is a file that stores messages (event logs) generated by an application, service, or operating system. These messages are used to track the operations performed. Log files are usually plain text (ASCII) files and often have a .log extension. You can use the Logs feature to view and clear several types of event logs provided by the system: Application logs (see “Application Log” on page 145).
“Modify Log Properties” on page 151 “View Log Details” on page 152 Clear Log Files From this page you can clear specific Log files. To clear a Log file 1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, select Logs. 3. On the Logs page, select the type of log you wish to clear. 4. From the Object Selection table for the specific log type you've chosen, click the radio button next to the log to clear. 5. From the Tasks list, click Clear. 6.
Figure 61 File Download 5. Select Save this file to disk 6. Click OK to download the file. To view the downloaded file 1. On the primary menu, click Maintenance. 2. On the Maintenance page, click Terminal Services Advanced Client. 3. Log in. 4. On the Terminal Services Client desktop, rightclick My Computer, and select the Manage item from the pop-up menu. The Computer Management window opens (Figure 33 on page 93). 5. In the left column of the Computer Management window, select Event Viewer. 6.
Modify Log Properties From this page you can specify the maximum log size, and determine how the system will handle log entries when the maximum capacity of the MaxAttach is reached. To modify the properties of a Log file 1. On the primary menu bar, select Maintenance. 2. On the Maintenance page, select Logs. 3. On the Logs page, select the type of log you wish to configure. 4. In the Object Selection for the specific log type you've chosen, click the radio button next to the log to configure. 5.
7. Select the radio button next to the description of how to handle log entries once the maximum log size is reached. You may choose to have the system Overwrite events as needed. You may choose to overwrite files that are at least a specified number of days old by entering a numerical value in the Overwrite events older than ____ days text box. — OR — You may prevent events from being overwritten by selecting the Do not overwrite events option.
Figure 63 Details 6. Click the Up and Down buttons to scroll through the log files. 7. Click Cancel to return to the Object Selection table for the specific log type you've chosen. Terminal Services Client The MaxAttach comes with Terminals Services for Remote Administration (TSRA) and allows two concurrent connections, and provides functionality similar to a terminal-based, centralized host, or mainframe, environment in which multiple terminals connect to a host computer.
accessing files, databases, network resources, and so on. Each terminal session is independent, with the host operating system managing conflicts between multiple users contending for shared resources. In sum, TSRA provides remote access for administering your MaxAttach from virtually anywhere on your network, giving system administrators a method of remotely managing the MaxAttach from any client.
When he or she is finished, he or she can either disconnect, and leave the session running (to enable connecting to this session again later) or log off, which will terminate the session and disconnect the client. Only two sessions are allowed. Leaving a session running takes up one license and can affect other users. If already two sessions are running, new users will be denied access.
MaxAttach 4100 unit. (See “LED Alerts” on page 159.) MaxAttach Administration UI Alerts The MaxAttach administration user interface provides alert messages to warn you of conditions that may require your intervention. At the top of the interface, under the server name, is a Status line that tells you the alert level of the highest current level. There are three types of alerts and three alert levels: Information: Message regarding a condition that does not require any immediate intervention.
3. Click the link associated with a message to display the full text. 4. Respond to the message. 5. Click the Clear Message link at the bottom of the message. Note: You can also receive alert messages as E-mail messages (see the next topic). For a complete list of alerts, see the Release Notes, or go to www.maxattach.com. E-mail Alerts The MaxAttach Administration UI alert messages (see previous topic) which warn of conditions that may require administrator intervention, can be sent as E-mail messages.
Figure 65 Set Alert Email 3. Select the Enable sending alert email radio button. (The Send critical alert email option will be selected by default.) 4. Click the checkbox next to each alert level for which you want email messages sent. 5. In the To: field, specify the email address of the person who should respond to the alert (administrator). Address should be entered in the form administratorname@domainname.com. 6. Leave the With field blank if email should be sent directly to the specified address.
Alert messages to administrators contain a link to the URL of the error message. LED Alerts During boot-up and power-down the soft power LED blinks and beeps. During operation, the LED can have one of four possible states: steady off, steady on, fast blinking and slow blinking. In the fast blinking state, the flashing period is 300msec with 50% duty cycle. In the slow blinking state, the flashing period is 600msec with 50% duty cycle.
Duplicate Network service detected that IP duplicate IP is used that may potentially stop client computer communication. Five blinks then a count of five followed by five blinks Duplicate Network service detected Server duplicate server name is used Name that may potentially stop client computer communication.
Appendix A: Status Alerts When you click Status: in the Status Area, an Alert page displays. The following list indicated the type of Alert page content each status type produces Normal status: the Alert page will indicate that there are no messages. Informational status: the Alert page will list the errors the system has encountered (as hyperlinks), with a word-bubble icon containing the letter i next to each error the system has encountered.
b. Warning Alert Detail pages provide a description of the problem, and a hyperlink to clear the message and return to the list of alerts. c. Critical Alert Detail pages provide a description of the problem, and a hyperlink to clear the message and return to the list of alerts. 2. To clear the alert, follow the directions on the Alert Detail page.
Appendix B: CIFS Overview The Common Internet File System (CIFS) protocol is used by clients running Windows. When you share a folder, you can choose permissions that will allow or deny other network users access to the files in that folder. For client computers running Microsoft Windows, you can also specify whether other Windows users will be able to make the shared folder available offline.
Automatic caching makes the contents of a folder available offline whether someone using your shared server appliance folder specifically chooses to make them available or not. Automatic caching makes every file that someone opens available to that person offline. Documents, drawings, program files, and other files can all be made available. Only those files that someone opens in your shared server appliance folder will continue to be available to that person when working offline.
“Modifying Windows or UNIX Share Properties” on page 126 “Initial MaxAttach Configuration” on page 13 MaxAttach NAS 4100 User Guide 165
166
Index A Adaptive load balancing 46 Administration web server 44 Administration web site changing properties 45 Administrator password changing 43 AFP 113 Alerts 155 E-mail 157 LED 159 status 161 Anonymous access FTP 85 Appliance shutting down 142 Application log 145 Automatic caching documents 163 programs 164 B Back panel 5 Back-up and restore tool 143 Battery 4 C Caching for documents automatic 163 manual 163 Caching for programs automatic 164 CIFS 113 CIFS Overview 163 CIFS share properties 127 Cleari
overview 83 FTP logging enabling 84 FTP server service 83 FTP share properties 131 IP address configuration 28 IP addresses resolving 23 IP settings changing 29 G L Gateway address settings 30 Gigabit Ethernet network 1 Gigabit Ethernet option 5 Global settings network 17 Group accounts adding 107 removing 109 Group mappings 73 Group membership 111 Group properties modifying 110 H Hard disk drive LED 5 Hardware requirements 1 Help context sensitive 14 using 13 Windows 2000 14 Home directory 102 Home pa
adding custom FTP 87 Microsoft Active Directory 18 Microsoft NT 4 domain 18 N Name and domain membership 17 Name resolution LMHOSTS 38 NAS appliance 9 Navigation model MaxAttach Administration UI 10 NCP 113 Netscape 1 NetWare 113 Network activity indicator 4 Network adapters 27 Network Attached Storage 9 Network interface card 2 Network service properties configuring 65 Network services disabling 65 enabling 64 Network setup 17 NFS 113 network protocol overview 67 NFS client groups adding 69 editing 70 rem
HTTP 133 NFS 129 Shares 113 adding 122, 136 managing 121, 133 modifying properties 126, 139 removing 124, 138 removing protocols 125 Shutting down the server appliance 143 Simple maps 76 Site planning 2 SNMP network protocol overview 95 SNMP agent 96 SNMP management system 95 SNMP service configuring 97 Soft power switch 4 Software requirements 1 Status area of U.I.